{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T06:31:56Z","timestamp":1762324316049},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2018,8,10]],"date-time":"2018-08-10T00:00:00Z","timestamp":1533859200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s00500-018-3444-y","type":"journal-article","created":{"date-parts":[[2018,8,10]],"date-time":"2018-08-10T04:20:17Z","timestamp":1533874817000},"page":"4531-4556","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["MS-ACO: a multi-stage ant colony optimization to refute complex software systems specified through graph transformation"],"prefix":"10.1007","volume":"23","author":[{"given":"Vahid","family":"Rafe","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mahsa","family":"Darghayedi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Einollah","family":"Pira","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,8,10]]},"reference":[{"key":"3444_CR1","doi-asserted-by":"crossref","unstructured":"Abowd G, Allen R, Garlan D (1993) Using style to give meaning to software architecture. In: ACM SIGSOFT software engineering notes, vol 18, no. 5. ACM, pp 9\u201320","DOI":"10.1145\/167049.167055"},{"key":"3444_CR2","unstructured":"Abreu N, Ajmal M, Kokkinogenis Z, Bozorg B (2011) Ant colony optimization [Online]. \n                    http:\/\/paginas.fe.up.pt\/~mac\/ensino\/docs\/DS20102011\/Presentations\/PopulationalMetaheuristics\/ACO_Nuno_Muhammad_Zafeiris_Behdad.pdf\n                    \n                  . Accessed 18 Jun 2012"},{"key":"3444_CR3","unstructured":"Agrawal R, Srikant R (1994) Fast algorithms for mining association rules. In: Proceedings of 20th international conferences on very large data bases, VLDB, vol 1215, pp 487\u2013499"},{"key":"3444_CR4","doi-asserted-by":"crossref","unstructured":"Alba E, Chicano F (2007a) Ant colony optimization for model checking. In: International conference on computer aided systems theory. Springer, Berlin, Heidelberg, pp 523\u2013530","DOI":"10.1007\/978-3-540-75867-9_66"},{"key":"3444_CR5","doi-asserted-by":"crossref","unstructured":"Alba E, Chicano F (2007b) ACOhg: dealing with huge graphs. In: Proceedings of the 9th annual conference on genetic and evolutionary computation. ACM, pp 10\u201317","DOI":"10.1145\/1276958.1276961"},{"key":"3444_CR6","doi-asserted-by":"crossref","unstructured":"Alba E, Chicano F (2007c) Finding safety errors with ACO. In: Proceedings of the 9th annual conference on Genetic and evolutionary computation. ACM, pp 1066\u20131073","DOI":"10.1145\/1276958.1277171"},{"key":"3444_CR7","doi-asserted-by":"crossref","unstructured":"Alba E, Chicano F (2008) Searching for liveness property violations in concurrent systems with ACO. In: Proceedings of the 10th annual conference on genetic and evolutionary computation, pp 1727\u20131734","DOI":"10.1145\/1389095.1389431"},{"key":"3444_CR8","doi-asserted-by":"crossref","unstructured":"Alba E, Chicano F, Ferreira M, Gomez-Pulido J (2008) Finding deadlocks in large concurrent java programs using genetic algorithms. In: Proceedings of the 10th annual conference on genetic and evolutionary computation, pp 1735\u20131742","DOI":"10.1145\/1389095.1389432"},{"key":"3444_CR9","volume-title":"Principles of model checking","author":"C Baier","year":"2008","unstructured":"Baier C, Katoen JP, Larsen KG (2008) Principles of model checking, vol 2620264. MIT press, Cambridge"},{"issue":"3","key":"3444_CR10","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1145\/937503.937505","volume":"35","author":"C Blum","year":"2003","unstructured":"Blum C, Roli A (2003) Metaheuristics in combinatorial optimization: overview and conceptual comparison. ACM Comput Surv 35(3):268\u2013308","journal-title":"ACM Comput Surv"},{"key":"3444_CR11","doi-asserted-by":"crossref","unstructured":"Chicano F, Francisco M, Ferreira M, Alba E (2011) Comparing metaheuristic algorithms for error detection in java programs. In: International symposium on search based software engineering, vol 6956. Springer, Berlin, Heidelberg, pp 82\u201396","DOI":"10.1007\/978-3-642-23716-4_11"},{"key":"3444_CR12","doi-asserted-by":"crossref","unstructured":"Clarke E, McMillan K, Campos S, Hartonas-Garmhausen V (1996) Symbolic model checking. In: International conference on computer aided verification, vol 1102. Springer, Berlin, Heidelberg, pp 419\u2013422","DOI":"10.1007\/3-540-61474-5_93"},{"key":"3444_CR13","doi-asserted-by":"crossref","unstructured":"Courcoubetis C, Vardi M, Wolper P, Yannakakis M (1992) Memory-efficient algorithms for the verification of temporal properties. In: Computer-aided verification, vol 1, issue 2\u20133. Springer, US, pp 129\u2013142","DOI":"10.1007\/978-1-4615-3556-0_5"},{"issue":"4","key":"3444_CR14","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MCI.2006.329691","volume":"1","author":"M Dorigo","year":"2006","unstructured":"Dorigo M, Birattari M, Stutzle T (2006) ant colony optimization. IEEE Comput Intell Mag 1(4):28\u201339","journal-title":"IEEE Comput Intell Mag"},{"key":"3444_CR15","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-642-15234-4_22","volume-title":"Distributed, parallel and biologically inspired systems","author":"LM Duarte","year":"2010","unstructured":"Duarte LM, Foss L, Wagner FR, Heimfarth T (2010) Model checking the ant colony optimization. In: Hinchey M, Kleinjohann B, Kleinjohann L, Lindsay P, Rammig FJ, Timmis J, Wolf M (eds) Distributed, parallel and biologically inspired systems, vol 329. Springer, Berlin, Heidelberg, pp 221\u2013232"},{"key":"3444_CR16","doi-asserted-by":"crossref","unstructured":"Edelkamp S, Reffel F (1998) OBDDs in heuristic search. In: Annual conference on artificial intelligence. Springer, Berlin Heidelberg, pp 81\u201392","DOI":"10.1007\/BFb0095430"},{"key":"3444_CR17","doi-asserted-by":"crossref","unstructured":"Edelkamp S, Lafuente AL, Leue S (2001) Directed explicit model checking with HSF-SPIN. In: Proceedings of the 8th international SPIN workshop on Model checking of software. Springer, New York, pp 57\u201379","DOI":"10.1007\/3-540-45139-0_5"},{"key":"3444_CR18","unstructured":"Edelkamp S, Lafuenteand AL, Leue S (2001) Protocol verification with heuristic search. In: AAAI symposium on model based validation of intelligence"},{"issue":"2\u20133","key":"3444_CR19","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s10009-002-0104-3","volume":"5","author":"S Edelkamp","year":"2004","unstructured":"Edelkamp S, Leue S, Lafuente AL (2004) Directed explicit-state model checking in the validation of communication protocols. Int J Softw Tools Technol (STTT) 5(2\u20133):247\u2013267","journal-title":"Int J Softw Tools Technol (STTT)"},{"key":"3444_CR20","doi-asserted-by":"crossref","unstructured":"Edelkamp S, Jabbar S, Lafuente AL (2006) Heuristic search for the analysis of graph transition systems. In: International conference on graph transformation. Springer, Berlin, Heidelberg, pp 414\u2013429","DOI":"10.1007\/11841883_29"},{"key":"3444_CR21","unstructured":"Elsinga JW (2016) On a framework for domain independent heuristics in graph transformation planning. Master\u2019s thesis, University of Twente"},{"key":"3444_CR22","doi-asserted-by":"crossref","unstructured":"Engels G, Hausmann JH, Heckel R, Sauer S (2000) Dynamic meta modeling: a graphical approach to the operational semantics of behavioral diagrams in UML. In: International conference on the unified modeling language. Springer, Berlin Heidelberg, pp 323\u2013337","DOI":"10.1007\/3-540-40011-7_23"},{"key":"3444_CR23","first-page":"54","volume":"2011","author":"HC Estler","year":"2011","unstructured":"Estler HC, Wehrheim H (2011) Heuristic search-based planning for graph transformation systems. KEPS 2011:54","journal-title":"KEPS"},{"key":"3444_CR24","doi-asserted-by":"crossref","unstructured":"Foster H, Uchitel S, Magee J, Kramer J (2006) LTSA-WS: a tool for model-based verification of web service compositions and choreography. In: Proceedings of the 28th international conference on software engineering, Shanghai, China, pp 771\u2013774","DOI":"10.1145\/1134285.1134408"},{"key":"3444_CR25","doi-asserted-by":"crossref","unstructured":"Francesca G, Santone A, Vaglini G, Villani ML (2011) Ant colony optimization for deadlock detection in concurrent systems. In: 2011 IEEE 35th annual computer software and applications conference. IEEE, pp 108\u2013117","DOI":"10.1109\/COMPSAC.2011.22"},{"key":"3444_CR26","doi-asserted-by":"crossref","unstructured":"Garlan D, Allen R, Ockerbloom J (1994) Exploiting style in architectural design environments. In: ACM SIGSOFT software engineering notes, vol. 19, no. 5. ACM, pp 175\u2013188","DOI":"10.1145\/195274.195404"},{"key":"3444_CR27","unstructured":"Gaschnig J (1979) Performance measurement and analysis of certain search algorithms. Technical Report. CMU-CS-79-124, Carnegie-Mellon University"},{"issue":"1","key":"3444_CR28","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s10009-011-0186-x","volume":"14","author":"AH Ghamarian","year":"2012","unstructured":"Ghamarian AH, de Mol M, Rensink A, Zambon E, Zimakova M (2012) Modelling and analysis using GROOVE. Int J Softw Tools Technol Transf (STTT) 14(1):15\u201340","journal-title":"Int J Softw Tools Technol Transf (STTT)"},{"key":"3444_CR29","unstructured":"Godefroid P (1990) Using partial orders to improve automatic verification methods. In: International conference on computer aided verification. Springer, Berlin, Heidelberg, pp 176\u2013185"},{"key":"3444_CR30","doi-asserted-by":"crossref","unstructured":"Godefroid P (1997) Model checking for programming languages using Verisoft. In: Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on principles of programming languages. ACM, pp 174\u2013186","DOI":"10.1145\/263699.263717"},{"key":"3444_CR31","doi-asserted-by":"crossref","unstructured":"Godefroid P, Khurshid S (2002) Exploring very large state spaces using genetic algorithms. In: International conference on tools and algorithms for the construction and analysis of systems. Springer, Berlin Heidelberg, pp 266\u2013280","DOI":"10.1007\/3-540-46002-0_19"},{"issue":"2","key":"3444_CR32","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BF01383879","volume":"2","author":"P Godefroid","year":"1993","unstructured":"Godefroid P, Wolper P (1993) Using partial orders for the efficient verification of deadlock freedom and safety properties. Formal Methods Syst Des 2(2):149\u2013164","journal-title":"Formal Methods Syst Des"},{"key":"3444_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60761-7","volume-title":"Partial-order methods for the verification of concurrent systems: an approach to the state-explosion problem","author":"P Godefroid","year":"1996","unstructured":"Godefroid P, Van Leeuwen J, Hartmanis J, Goos G, Wolper P (1996) Partial-order methods for the verification of concurrent systems: an approach to the state-explosion problem, vol 1032. Springer, Heidelberg"},{"issue":"4","key":"3444_CR34","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/s10009-003-0130-9","volume":"6","author":"A Groce","year":"2004","unstructured":"Groce A, Visser W (2004) Heuristics for model checking Java programs. Int J Softw Tools Technol Transf (STTT) 6(4):260\u2013276","journal-title":"Int J Softw Tools Technol Transf (STTT)"},{"key":"3444_CR35","unstructured":"Hausmann JH (2005) Dynamic meta modeling: a semantics description technique for visual modeling techniques. Ph.D. Thesis, Universit\u00e4t Paderborn"},{"issue":"1","key":"3444_CR36","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.entcs.2005.12.018","volume":"148","author":"R Heckel","year":"2006","unstructured":"Heckel R (2006) Graph transformation in a nutshell. Electron Notes Theoret Comput Sci 148(1):187\u2013198","journal-title":"Electron Notes Theoret Comput Sci"},{"issue":"3","key":"3444_CR37","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.entcs.2004.08.037","volume":"127","author":"R Heckel","year":"2005","unstructured":"Heckel R, Th\u00f6ne S (2005) Behavioral refinement of graph transformation-based models. Electron Notes Theor Comput Sci 127(3):101\u2013111","journal-title":"Electron Notes Theor Comput Sci"},{"issue":"5","key":"3444_CR38","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/32.588521","volume":"23","author":"GJ Holzmann","year":"1997","unstructured":"Holzmann GJ (1997) The model checker SPIN. IEEE Trans Softw Eng 23(5):279\u2013295","journal-title":"IEEE Trans Softw Eng"},{"key":"3444_CR39","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-642-38592-6_13","volume-title":"Formal techniques for distributed systems","author":"T Isenberg","year":"2013","unstructured":"Isenberg T, Steenken D, Wehrheim H (2013) Bounded model checking of graph transformation systems via SMT solving. In: Formal techniques for distributed systems, vol 7892. Springer, Berlin, Heidelberg, pp 178\u2013192"},{"key":"3444_CR40","doi-asserted-by":"crossref","unstructured":"Kumazawa T, Yokoyama C, Takimoto M, Kambayashi Y (2016) Ant colony optimization based model checking extended by smell-like pheromone. In: Proceedings of the 9th EAI international conference on bio-inspired information and communications technologies (formerly BIONETICS), pp 214\u2013220","DOI":"10.4108\/eai.3-12-2015.2262408"},{"key":"3444_CR41","unstructured":"Lafuente AL (2003) Symmetry reduction and heuristic search for error detection in model checking. In: Workshop on model checking and artificial intelligence"},{"key":"3444_CR42","doi-asserted-by":"crossref","unstructured":"Maeoka J, Tanabe Y, Ishikawa F (2016) Depth-first heuristic search for software model checking. In: Computer and information science, vol 614. Springer International Publishing, pp 75\u201396","DOI":"10.1007\/978-3-319-23467-0_6"},{"key":"3444_CR43","doi-asserted-by":"crossref","unstructured":"Mens T (2006) On the use of graph transformations for model refactoring. In: Generative and transformational techniques in software engineering. Springer, Berlin Heidelberg, pp 219\u2013257","DOI":"10.1007\/11877028_7"},{"key":"3444_CR44","doi-asserted-by":"crossref","unstructured":"Mens T, Van Der Straeten R, D\u2019Hondt M (2006) Detecting and resolving model inconsistencies using transformation dependency analysis. In: International conference on model driven engineering languages and systems. Springer, Berlin Heidelberg, pp 200\u2013214","DOI":"10.1007\/11880240_15"},{"issue":"4","key":"3444_CR45","first-page":"797","volume":"32","author":"MR Naddaf","year":"2014","unstructured":"Naddaf MR, Rafe V (2014) Performance modeling and analysis of software architectures specified through graph transformations. Comput Inform 32(4):797\u2013826","journal-title":"Comput Inform"},{"key":"3444_CR46","volume-title":"Probabilistic reasoning in intelligent systems: networks of plausible inference","author":"J Pearl","year":"2014","unstructured":"Pearl J (2014) Probabilistic reasoning in intelligent systems: networks of plausible inference. Morgan Kaufmann, Burlington"},{"key":"3444_CR47","first-page":"2738","volume-title":"Hierarchical bayesian optimization algorithm: toward a new generation of evolutionary algorithms","author":"M Pelikan","year":"2003","unstructured":"Pelikan M, Goldberg DE, Tsutsui S (2003) Hierarchical bayesian optimization algorithm: toward a new generation of evolutionary algorithms, vol 3. Springer, Berlin, Heidelberg, pp 2738\u20132743"},{"key":"3444_CR48","unstructured":"Peng H, Tahar S (1998) A survey on compositional verification. Technical Report, Department of Electrical and Computer Engineering, Concordia University"},{"key":"3444_CR49","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1016\/j.asoc.2016.06.039","volume":"49","author":"E Pira","year":"2016","unstructured":"Pira E, Rafe V, Nikanjam A (2016) EMCDM: efficient model checking by data mining for verification of complex software systems specified through architectural styles. Appl Soft Comput 49:1185\u20131201","journal-title":"Appl Soft Comput"},{"key":"3444_CR50","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.jss.2017.05.128","volume":"131","author":"E Pira","year":"2017","unstructured":"Pira E, Rafe V, Nikanjam A (2017) Deadlock detection in complex software systems specified through graph transformation using bayesian optimization algorithm. J Syst Softw 131:181\u2013200","journal-title":"J Syst Softw"},{"key":"3444_CR51","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.infsof.2018.01.004","volume":"97","author":"E Pira","year":"2018","unstructured":"Pira E, Rafe V, Nikanjam A (2018) Searching for violation of safety and liveness properties using knowledge discovery in complex systems specified through graph transformations. Inf Softw Technol 97:110\u2013134","journal-title":"Inf Softw Technol"},{"issue":"2","key":"3444_CR52","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.jvlc.2012.12.002","volume":"24","author":"V Rafe","year":"2013","unstructured":"Rafe V (2013) Scenario-driven analysis of systems specified through graph transformations. J Vis Lang Comput 24(2):136\u2013145","journal-title":"J Vis Lang Comput"},{"issue":"2","key":"3444_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-013-9927-6","volume":"37","author":"V Rafe","year":"2013","unstructured":"Rafe V, Hajvali M (2013) Designing an architectural style for pervasive healthcare systems. J Med Syst 37(2):1\u201313","journal-title":"J Med Syst"},{"key":"3444_CR54","unstructured":"Rafe V, Rahmani AT (2008) Formal analysis of workflows using UML 2.0 activities and graph transformation systems. In: International colloquium on theoretical aspects of computing. Springer Berlin, Heidelberg, pp 305\u2013318"},{"issue":"8","key":"3444_CR55","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.1631\/jzus.A0820415","volume":"10","author":"V Rafe","year":"2009","unstructured":"Rafe V, Rahmani AT (2009) Towards automated software model checking using graph transformation systems and Bogor. J Zhejiang Univ Sci A 10(8):1093\u20131105","journal-title":"J Zhejiang Univ Sci A"},{"key":"3444_CR56","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.asoc.2015.04.032","volume":"33","author":"V Rafe","year":"2015","unstructured":"Rafe V, Moradi M, Yousefian R, Nikanjam A (2015) A meta-heuristic solution for automated refutation of complex software systems specified through graph transformations. Appl Soft Comput 33:136\u2013149","journal-title":"Appl Soft Comput"},{"key":"3444_CR57","unstructured":"Rensink A (2003) The GROOVE simulator: a tool for state space generation. In: International workshop on applications of graph transformations with industrial relevance. Springer, Berlin, Heidelberg, pp 479\u2013485"},{"key":"3444_CR58","volume-title":"User manual for the GROOVE tool set","author":"A Rensink","year":"2010","unstructured":"Rensink A, Boneva I, Kastenberg H, Staijen T (2010) User manual for the GROOVE tool set. Department of Computer Science, University of Twente, Enschede"},{"key":"3444_CR59","doi-asserted-by":"crossref","unstructured":"Roever WP (1998) The need for compositional proof systems: a survey. In: Compositionality: the significant difference. Springer, Berlin, Heidelberg, pp 1\u201322","DOI":"10.1007\/3-540-49213-5_1"},{"key":"3444_CR60","unstructured":"Schmidt A (2004) Model checking of visual modeling languages. Master\u2019s Thesis, Budapest University of Technology and Economics, Hungary"},{"issue":"1","key":"3444_CR61","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/S1571-0661(05)80096-9","volume":"89","author":"H Sivaraja","year":"2003","unstructured":"Sivaraja H, Gopalakrishnan G (2003) Random walk based heuristic algorithms for distributed memory model checking. Electron Notes Theoret Comput Sci 89(1):51\u201367","journal-title":"Electron Notes Theoret Comput Sci"},{"key":"3444_CR62","unstructured":"Snippe E (2011) Using heuristic search to solve planning problems in GROOVE. In: 14th Twente student conference on IT. University of Twente"},{"key":"3444_CR63","doi-asserted-by":"crossref","unstructured":"Stern U, Dill D (1995) Improved probabilistic verification by hash compaction. In: Advanced research working conference on correct hardware design and verification methods, vol 987. Springer, Berlin, Heidelberg, pp 206\u2013224","DOI":"10.1007\/3-540-60385-9_13"},{"key":"3444_CR64","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-0-387-35079-0_21","volume-title":"Formal description techniques IX","author":"U Stern","year":"1996","unstructured":"Stern U, Dill DL (1996) A new scheme for memory-efficient probabilistic verification. In: Formal description techniques IX. Springer, US, pp 333\u2013348"},{"key":"3444_CR65","unstructured":"Swaroop D (1997) String stability of interconnected systems: an application to platooning in automated highway systems. California Partners for Advanced Transit and Highways (PATH)"},{"key":"3444_CR66","unstructured":"Taentzer G, Ehrig K, Guerra E, Lara JD, Lengyel L, Levendovszky T, Prange U, Varro D, Varro-Gyapay S (2005) Model transformation by graph transformation: a comparative study. In: Proceedings of model transformations in practice workshop, MoDELS conference, Montego Bay, Jamaica"},{"key":"3444_CR67","doi-asserted-by":"crossref","unstructured":"Takada K, Takimoto M, Kumazawa T, Kambayashi Y (2017) ACO based model checking extended by smell-like pheromone with hop counts. In: Harmony search algorithm: proceedings of the 3rd international conference on harmony search algorithm, vol 514 (ICHSA 2017). Springer, p 52","DOI":"10.1007\/978-981-10-3728-3_7"},{"issue":"2","key":"3444_CR68","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/s005000000047","volume":"4","author":"JP Thomas","year":"2000","unstructured":"Thomas JP (2000) Design and verification of a coordination protocol for cooperating systems. Soft Comput 4(2):130\u2013140","journal-title":"Soft Comput"},{"key":"3444_CR69","unstructured":"Th\u00f6ne S (2005) Dynamic software architectures: a style based modeling and refinement technique with graph transformations. Ph.D. Thesis, Faculty of Computer Science, Electrical Engineering, and Mathematics, University of Paderborn"},{"key":"3444_CR70","unstructured":"Valmari A (1988) Error detection by reduced reachability graph generation. In: Proceedings of the 9th European workshop on application and theory of petri nets, pp 95\u2013112"},{"issue":"6","key":"3444_CR71","doi-asserted-by":"publisher","first-page":"80","DOI":"10.2307\/3001968","volume":"1","author":"F Wilcoxon","year":"1945","unstructured":"Wilcoxon F (1945) Individual comparisons by ranking methods. Biom Bull 1(6):80\u201383","journal-title":"Biom Bull"},{"key":"3444_CR72","doi-asserted-by":"crossref","unstructured":"Wolper P, Leroy D (1993) Reliable hashing without collision detection. In: International conference on computer aided verification. Springer, Berlin Heidelberg, pp 59\u201370","DOI":"10.1007\/3-540-56922-7_6"},{"key":"3444_CR73","unstructured":"Yang CH (1999) Prioritized model checking. Ph.D. thesis, Stanford University"},{"key":"3444_CR74","doi-asserted-by":"crossref","unstructured":"Yang XS (2010) A new metaheuristic bat-inspired algorithm. In: Nature inspired cooperative strategies for optimization (NICSO 2010), vol 284, pp 65\u201374","DOI":"10.1007\/978-3-642-12538-6_6"},{"key":"3444_CR75","unstructured":"Yang CH, Dill DL (1998) Validation with guided search of the state space. In: Proceedings of the 35th annual design automation conference, pp 599\u2013604"},{"key":"3444_CR76","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.asoc.2014.06.055","volume":"24","author":"R Yousefian","year":"2014","unstructured":"Yousefian R, Rafe V, Rahmani M (2014) A heuristic solution for model checking graph transformation systems. Appl Soft Comput 24:169\u2013180","journal-title":"Appl Soft Comput"},{"issue":"1","key":"3444_CR77","doi-asserted-by":"publisher","first-page":"137","DOI":"10.3233\/IFS-162127","volume":"31","author":"R Yousefian","year":"2016","unstructured":"Yousefian R, Aboutorabi S, Rafe V (2016) A greedy algorithm versus metaheuristic solutions to deadlock detection in graph transformation systems. J Intell Fuzzy Syst 31(1):137\u2013149","journal-title":"J Intell Fuzzy Syst"},{"key":"3444_CR78","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3314-7","author":"W Zhu","year":"2018","unstructured":"Zhu W, Han Y, Zhou Q (2018) Performing CTL model checking via DNA computing. Soft Comput. \n                    https:\/\/doi.org\/10.1007\/s00500-018-3314-7","journal-title":"Soft Comput"},{"key":"3444_CR79","doi-asserted-by":"crossref","unstructured":"Ziegert S (2014) Graph transformation planning via abstraction. arXiv preprint arXiv: 1407.7933","DOI":"10.4204\/EPTCS.159.7"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3444-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-018-3444-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3444-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T06:14:03Z","timestamp":1565849643000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-018-3444-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,10]]},"references-count":79,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["3444"],"URL":"https:\/\/doi.org\/10.1007\/s00500-018-3444-y","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,10]]},"assertion":[{"value":"10 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}